15

Start Here

Introduction to Cryptography

Disclaimer: The content of these research summaries has been written after a year of reading, researching and writing about blockchain technologies and applications. Definitions may vary depending on the paper cited. The summaries provided are subject to further iterations; whereby, the first version relies on my personal understanding of the industry and the technologies. Most of it is based on informal discussions, academic papers, industry whitepapers and primary research. These research summ

Building on Bulletproofs - Short Proofs for Confidential Transactions

This article was original published by Cathie Yun on Medium special thanks to Cathie for allowing us to import to Kauri Preface In this post, I will explain how the Bulletproofs zero knowledge proof protocol works, as well as talk about the confidential asset protocol and confidential smart contract language we are building using Bulletproofs. This post is a condensed version of previous talks and blog posts and our Bulletproofs library documentation . It has also been featured in the MIT Digita

Privacy Fundamental Projects

Enigma Protocol

The Enigma protocol is a decentralized and distributed network of servers around the world (known as ‘nodes’) which, through the use of secret contracts, are able to compute data in a way that maintains confidentiality and integrity. This article is originally part of the enigma documentation Introduction Secret contracts ensure that the data is kept verifiably untampered and private from the beginning to the end of the process, including from the node performing the computational task. The Enig

How to Code Your Own Confidential Token on Ethereum

an efficient zero-knowledge privacy protocol to enable private transactions aztec powers real world financial applications on ethereum mainnet today This article originally appeared on the Aztec Protocol blog Ethereum is not private. Every time you transfer an ERC20 token or any other digital asset, information is leaked to third parties. They could find out your full financial history simply by heading to Etherscan, Blockscout or any other blockchain explorer out there. Fear not, there are ways

Data Privacy with the NuCypher Network

The NuCypher network uses the Umbral threshold proxy re-encryption scheme to provide cryptographic access controls for distributed apps and protocols. This article is adapted from the NuCypher documentationOverview Alice, the data owner, grants access to her encrypted data to anyone she wants by creating a policy and uploading it to the NuCypher network. Using her policy’s public key, any entity can encrypt data on Alice’s behalf. This entity could be an IoT device in her car, a collaborator ass

NuCypher - PyUmbral

pyUmbral is the reference implementation of the Umbral threshold proxy re-encryption scheme. It is open-source, built with Python, and uses OpenSSL and Cryptography.io. This article is adapted from the pyUmbral documentation Using Umbral, Alice (the data owner) can delegate decryption rights to Bob for any ciphertext intended to her, through a re-encryption process performed by a set of semi-trusted proxies or Ursulas. When a threshold of these proxies participate by performing re-encryption, Bo

Nightfall - Private Token and NFT Transfers on Ethereum

Nightfall Nightfall integrates a set of smart contracts and microservices, and the ZoKrates zk-snark toolkit, to enable standard ERC-20 and ERC-721 tokens to be transacted on the Ethereum blockchain with complete privacy. It is an experimental solution and still being actively developed. We decided to share our research work in the belief that this will speed adoption of public blockchains. This is not intended to be a production-ready application and we do not recommend that you use it as such.

Privacy in Clients

Privacy with Pantheon Ethereum Java Client

This article is taken from the pantheon documentation Privacy in Pantheon refers to the ability to keep transactions private between the involved parties. Other parties cannot access the transaction content, sending party, or list of participating parties. For production systems requiring private transactions, we recommend using a network with a consensus mechanism supporting transaction finality. For example, IBFT 2.0. Privacy in Pantheon: How PegaSys Has Redefined Blockchain for Enterprises Pr

Parity - Private Transactions

Parity Ethereums private transactions feature allows to store, modify and view encrypted data on the Ethereum blockchain. The solution is agnostic to the type of the chain. You can deploy it on any Ethereum based chain with any consensus algorithm. To learn how to implement the private transactions feature, follow this tutorial. Terminology Public contract: A specifically crafted smart contract deployed on Ethereum blockchain that wraps a private contract. See the source of the contract. The pub

Introducing Beam!

This story has been published in 2018 and updated in May 2019. Why today? We couldn’t think of a better day to introduce our project and what we have been up to. Thursday July 19th marks the day that an anonymous developer by the handle of “Tom Elvis Jedusor” first proposed the possibility of an elegant cryptographic protocol that addressed once for both scalability and anonymity — Mimblewimble. It is only through this anonymous developer’s foundational efforts that we are able to carry the ball

A Short History of Mimblewimble: From Hogwarts to Mobile Wallets

“Mimblewimble, which prevents your opponent from accurately casting their next spell.” — Gilderoy Lockhart imblewimble. Mim-bull-wim-bull. Pretty crazy that such a silly word is the basis of a growing revolution within the crypto world. Mimblewimble, for crypto enthusiasts, Bitcoin Maximalists, and privacy defenders, became, within less than two years, one of the best-kept secrets in crypto. But what’s the story behind it? What’s the connection with the Harry Potter universe and why, oh God why,

Why Beam is Sound Money

What is Sound Money? Sound Money refers to a currency that derives its value from the markets rather than from the governments. It is resilient to manipulation and debasing . Sound money does not lose its value over time and thus encourages saving and long-term investment, providing its holders with confidence and stability . What Philosophers had to say Since the birth of philosophy in Ancient Greece, thinkers were interested in the subject of money and wealth. Like with many other questions, A

Privacy Based Chains

Introduction to MimbleWimble and Grin

This article is originally part of the grin documentation You can learn how to get started with grin here Read this in other languages:, 简体中文, Español, Nederlands, Русский, 日本語, Deutsch, Portuguese, Korean. MimbleWimble is a blockchain format and protocol that provides extremely good scalability, privacy and fungibility by relying on strong cryptographic primitives. It addresses gaps existing in almost all current blockchain implementations. Grin is an open source software project that implement

A beginner’s guide to Zcash

This article was originally published on Medium What is Zcash? According to the Zcash website, “Zcash is the first open, permissionless cryptocurrency that can fully protect the privacy of transactions using zero-knowledge cryptography.” Bitcoin is an open and permissionless cryptocurrency but there is a common misconception that bitcoin transactions are anonymous. A history of every bitcoin transaction is displayed on a public ledger called the blockchain. Sophisticated software can be used to

A beginner’s guide to Monero

This article was originally published on Medium What is Monero? According to the Monero website , “Monero is a secure, private, untraceable currency.” Some people might think that this definition could be applied to Bitcoin but that is actually not the case when it comes to being private and untraceable. Monero is a digital currency that uses a different kind of cryptography to allow for these specific attributes. This beginner’s guide should help those who are new to Monero to understand the hi